The Distinguish Between Information Security and Privacy

Alia M AlSulaimi

Abstract

People, on the global scale, are either with government surveillance on information to ensure their safety or against it to protect their own privacy. Therefore, this paper sheds light on both sides and shows possible solutions to reveal the distinguish between information security and privacy. They represent two different and complementary domains of action. Security and privacy represent essential elements of an interconnected world of information. In this world, the demand for access to personal information is strong and increasing; it’s required to adjust products people’s taste. Security plays a role for the state in controlling and monitoring the transactions and movements.

Full Text:

PDF

References

Thuraisingham, B., “Data Warehousing, Data Mining and Security,” IFIP Database Security Conference, Como, Italy, July 1996 (paper in a book by Chapman and Hall, 1997).

An Enemy Within. By: Von Drehle, David, Ghosh, Bobby, Scherer, Michael, Zaidi, S. Hussain, Baker, Aryn, James, Randy, Stephey, M. J., Peters, Gretchen, Time, 0040781X, 10/12/2009, Vol. 174, Issue 14

Nye, Joseph S., Philip Zelikow, and David C. King, eds. Why people don't trust the government. Harvard University Press, 1997.

Walden, Gwen I. "Who’s watching us now? The nonprofit sector and the new government by surveillance." Nonprofit and Voluntary Sector Quarterly 35.4 (2006): 715-720.

Dahl, Erik J. "The plots that failed: Intelligence lessons learned from unsuccessful terrorist attacks against the United States." Studies in Conflict & Terrorism 34.8 (2011): 621- 648., Journal of Policing, Intelligence and Counter Terrorism Volume 9, 2014 – Issue.

Landau, Susan. "Making sense from Snowden: What's significant in the NSA surveillance revelations." IEEE Security & Privacy 11.4 (2013): 54-63.

Carafano, James Jay. "US thwarts 19 terrorist attacks against America since 9/11." Backgrounder 2085 (2006).

Associated Press News and Information Research Center, “List of foiled terror plots,” Newsday, June 2, 2007

Westin, A.F., 2001. Opinion Surveys: What Consumers Have to Say About Information Privacy, Prepared Witness Testimony, The House Committee on Energy and Commerce, W.J. Billy Tauzin, Chairman, May 8.

Verble, Joseph. "The NSA and Edward Snowden: surveillance in the 21st century." ACM SIGCAS Computers and Society 44.3 (2014): 14-20.

Qin, Jie. "Hero on Twitter, a traitor on news: How social media and legacy news frame Snowden." The international journal of press/politics 20.2 (2015): 166-184.

Cassidy, John. "Why Edward Snowden is a hero." The New Yorker 10 (2013).

Fenner, G. "Edward Snowden: Hero or Traitor?" (2014).

Beavers, Olivia. “Gov't contractor charged with leaking classified info to media.” The Hill, 5 June 2017, thehill.com/homenews/ administration/336432-federal-government-contractor-charged-for-leaking-classified-material.

James Waldo, Herbert S. Lin, and Lynette I. Millett, Editors; Committee on Privacy in the Information Age; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council ISBN 978-0-309-10392-3 | DOI 10.17226/11896.

Lloyd N. Cutler, of Wilmer, Cutler, and Pickering, was co-chair until he passed away on May 8, 2005.

Nuala O’Connor Kelly, Chief Privacy Officer, United States Department of Homeland Security, Privacy Office Report to Congress April 2003 – June 2004.

Freedom House. Freedom in the Middle East and North Africa: A Freedom in the World. Rowman & Littlefield, 2005.

Bellman, Steven, et al. "International differences in information privacy concerns: A global survey of consumers." The Information Society 20.5 (2004): 313-324.

Hafez, Kai. "Journalism ethics revisited: A comparison of ethics codes in Europe, North Africa, the Middle East, and Muslim Asia." Political communication 19.2 (2002): 225- 250.

Solove, Daniel J. "I've got nothing to hide and other misunderstandings of privacy." San Diego L. Rev. 44 (2007): 745.

Kenney, Michael. "From Pablo to Osama: Counter-terrorism lessons from the war on drugs." Survival 45.3 (2003): 187-206.

Dinev, Tamara, Paul Hart, and Michael R. Mullen. "Internet privacy concerns and beliefs about government surveillance–An empirical investigation." The Journal of Strategic Information Systems 17.3 (2008): 214-233.

Suggested Citation:"9 Privacy, Law Enforcement, and National Security." National Research Council. 2007. Engaging Privacy and Information Technology in a Digital Age. Washington, DC: The National Academies Press. doi: 10.17226/11896.

Michel man, Scott. "Who can sue over government surveillance." UCLA L. Rev. 57 (2009).

National Research Council. 2007. Engaging Privacy and Information Technology in a Digital Age. Washington, DC: The National Academies Press. doi: 10.17226/11896.

Beaver, Kevin: “Information privacy and security requires a balancing act”, 2003, https://searchsecurity.techtarget.com/tip/ Information-privacy-and-security-requires-a-balancing-act

Refbacks

  • There are currently no refbacks.